comp.lang.ada
 help / color / mirror / Atom feed
From: Kilgallen@SpamCop.net (Larry Kilgallen)
Subject: Re: How unchecked conversion works?
Date: 16 Jan 2005 18:34:22 -0600
Date: 2005-01-16T18:34:22-06:00	[thread overview]
Message-ID: <4zSInARGfY3p@eisner.encompasserve.org> (raw)
In-Reply-To: 8PwGd.8282$pZ4.6177@newsread1.news.pas.earthlink.net

In article <8PwGd.8282$pZ4.6177@newsread1.news.pas.earthlink.net>, Jeffrey Carter <spam@spam.com> writes:

> He had achieved everything except there was one small covert channel 
> available. A trusted user could set up a program that created a lot of 
> processes when it wanted to transmit a one, and no processes to transmit 
> a zero. The untrusted recipient would create a process from time to time 
> and see how many processes had been created, since process IDs were 
> sequential.

Analysis of such covert storage channels is actually required for
any assurance level above B1, not just for A1.

http://www.atis.org/tg2k/_covert_storage_channel.html

> It seems to me that this system was a success. Nothing stops the trusted 
> person from memorizing a block of data, going out of the secure area, 
> writing it down, and giving it to the recipient.

But the person doing that would know they were doing that.  No computer
system can prevent a human from releasing information they know, even if
they have to carry one bit a day out of the workplace based on which of
their pockets they use to store their wallet.

A trusted system (at the proper evaluation level) will prevent the person
from _inadvertantly_ releasing information, such as by running a trojan
horse spreadsheet program that performed the modulation you describe.



  parent reply	other threads:[~2005-01-17  0:34 UTC|newest]

Thread overview: 24+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2005-01-13 18:54 How unchecked conversion works? None
2005-01-13 21:22 ` Frank J. Lhota
2005-01-13 22:28 ` Keith Thompson
2005-01-14  0:17   ` Larry Kilgallen
2005-01-14 15:23 ` None
2005-01-14 15:55   ` Marius Amado Alves
2005-01-14 22:29     ` Keith Thompson
2005-01-14 23:15       ` Marius Amado Alves
2005-01-15  1:27         ` Keith Thompson
2005-01-15  2:15         ` Larry Kilgallen
2005-01-15 10:24           ` Marius Amado Alves
2005-01-15 12:02             ` Larry Kilgallen
2005-01-15 16:54               ` Nick Roberts
2005-01-16 16:14                 ` Larry Kilgallen
2005-01-16 16:41                   ` Jeffrey Carter
2005-01-16 20:52                     ` TCSEC security levels [was: How unchecked conversion works?] Nick Roberts
2005-01-17 15:57                       ` Larry Kilgallen
2005-01-17  0:34                     ` Larry Kilgallen [this message]
2005-01-17  1:29                       ` How unchecked conversion works? Jeffrey Carter
2005-01-17  4:20                         ` Larry Kilgallen
2005-01-15 18:24             ` Jeffrey Carter
2005-01-14 16:52   ` Mark H Johnson
2005-01-14 22:27     ` Keith Thompson
2005-01-14 22:49   ` Stephen Leake
replies disabled

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox